The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the suitability of Extreme Learning Machines (ELM) for resolving bioinformatic and biomedical classification problems. In order to test their overall performance, an experimental study is presented based on five gene microarray datasets found in bioinformatic and biomedical domains. The Fast Correlation-Based Filter (FCBF) was applied in order to identify salient expression genes...
This paper presents an efficient real-time knowledge base architecture for multi-agent based patient diagnostic system for chronic disease management, basically, the early detection of Inflammation of urinary bladder and Nephritis of renal pelvis origin diseases. The model integrates information stored heterogeneous and geographically distributed healthcare centers. The paper presents two main contributions...
This paper aims to assess the effectiveness of three different clustering algorithms, used to detect breast cancer recurrent events. The performance of a classical k-means algorithm is compared with a much more sophisticated Self-Organizing Map (SOM-Kohonen network) and a cluster network, closely related to both k-means and SOM. The three clustering algorithms have been applied on a concrete breast...
Business intelligence is a new methodology to maximize the benefits for healthcare organization Business intelligence provides an integrated view of data that can be used to monitor, key performance indicators, identify hidden patterns in diagnosis and identify variations in cost factors. Intelligent techniques provide an effective computational methods and robust environment for business intelligence...
The classification of imbalanced data is a well-studied topic in data mining. However, there is still a lack of understanding of the factors that make the problem difficult. In this work, we study the two main reasons that make the classification of imbalanced datasets complex: overlapping and data fracture. We present a Genetic Programming-based feature extraction method driven by Rough Set Theory...
Research on the Egyptian food security, has become the subject of countless studies and debates. The gap between the Egyptian domestic food production and consumption is translated into high import costs. In this paper, modeling, simulation analytical capability, expert experiences and imagination, and policy/decision makers' insights are integrated in a decision support system (DSS). The developed...
This paper presents a web-application supporting structured decision modelling and analysis. The application allows for decision modelling with respect to different preferences and views, allowing for numerically imprecise and vague background probabilities, values, and criteria weights, which further can be adjusted in an interactive fashion when considering calculated decision outcomes. The web-application...
Multi-Agent Path Planning (MAPP) can be considered the basic building block for implementing a reliable Multi-Agent Systems capable for interacting with real world. MAPP main task is how to get the appropriate path for movable agents where each agent is considered a dynamic obstacle to the others. Planning the exact path for each movable agent in a highly dynamic environment is a difficult task. This...
In this paper we propose a music Query by Humming System made of two main functional blocks; the first implements a voice-to-midi transcription algorithm to process the query, the second implements a search engine based on a novel template matching technique for Dynamic Time Warping. The voice-to-midi algorithm transforms the sung or hummed query in a MIDI file by segmenting and identifying the notes'...
Inspite of the huge amounts of image data on the web, mining image data from the web is paid less attention than mining text data, since treating the semantics of images is much more difficult. This paper introduces a new system to mine visual knowledge on the web that aims to build a Domain Oriented Image Directory by using the Earth Mover's Distance and Color signatures. Instead of using a flat...
In this paper we address the problem of how to measure information conveyed by an Atanassov's intuitionistic fuzzy set (A-IFS for short) and a related concept of knowledge that is explicitly context oriented and useful from the point of view of a specific purpose, notably related to decision making. We pay particular attention to the relationship between the positive and negative information and a...
Classification in imbalanced domains has become one of the most relevant problems within the area of Machine Learning at the present. This problem has raised in significance due to its presence in many real applications and it occurs when the distribution of the available examples to carry out the learning process is very different between the classes (often for binary class data-sets). Usually, the...
In this paper we perform the analysis of Dempster-Shafer temporalized structure for the construction of more precise decisions based on the expert knowledge valuations. The relation of information precision is defined on the bodies of evidence. Negative inaccuracy is defined as the stream of rational expert knowledge in Dempster-Shafer temporalized structure. The principle of negative inaccuracy is...
This paper presents the symbol presentation method for Universal Design (UD). Current symbol presentations for UD focus on how to design a simple and perceptible symbol for as many users as possible. As a result, the same symbol is presented to every user and therefore some users with specific attributes (e.g., color-blindness, cultural or physical conditions) can not perceive the symbol appropriately...
Association rules are adopted to discover the interesting relationship and knowledge in a large dataset. Knowledge may appear in terms of a frequent pattern discovered in a large number of production data. This knowledge can improve or solve production problems to achieve low cost production. To obtain knowledge and quality information, data mining can be applied to the manufacturing industry. In...
Mobile web browsing signifies accessing the content on web pages using a mobile device. It is common for Internet search engines to use keyword searching in which rank is assigned to each page based on several features. But it is an arduous task for a user to inscribe a keyword in such a delicate small mobile screen. A challenging research goal is the development of advanced web-based applications...
A set of distributed continual range query requests, each defining a geographical region of interest, needs to be periodically reevaluated to provide up to date answers. Processing these continual queries efficiently and incrementally becomes important for location based services and applications. In this paper, we propose an efficient incremental method for continuous range query characterized by...
The concept of e-learning has become popular in recent years as higher education institutions have been introducing it to support the conventional teaching approach. However, the implementation of e-learning in technical disciplines (e.g. Robotics and Simulation) is still far behind the rapid growth of practice in narrative disciplines (e.g. Database and Theory of Computer Science). The perception...
The retransmission timeout (RTO) timer used in TCP has long been standardized by the IETF in RFC2988, referred to as the TCP-RFC in this paper. Over the years, various deficiencies have been identified. In this paper, we focus on the implicit RTO offset problem, where the exact timeout limit of each packet is stretched by restarting the timer using the current timer value on the arrival of each acknowledgement...
This paper proposed a personal authentication system using small resources for home use. The following three goals were achieved at the same time by this system: (1) identification of each individual, (2) unique existence of each individual in the specified time and space, and (3) no contradiction in the existence of each individual in view of the space and the time before and after an event. Considering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.